Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-w3x9-vw38-f9cq

Опубликовано: 13 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Cumin before 0.1.5444, as used in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0, uses predictable random numbers to generate session keys, which makes it easier for remote attackers to guess the session key.

Cumin before 0.1.5444, as used in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0, uses predictable random numbers to generate session keys, which makes it easier for remote attackers to guess the session key.

EPSS

Процентиль: 70%
0.00651
Низкий

Связанные уязвимости

redhat
больше 13 лет назад

Cumin before 0.1.5444, as used in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0, uses predictable random numbers to generate session keys, which makes it easier for remote attackers to guess the session key.

nvd
больше 13 лет назад

Cumin before 0.1.5444, as used in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0, uses predictable random numbers to generate session keys, which makes it easier for remote attackers to guess the session key.

EPSS

Процентиль: 70%
0.00651
Низкий